On the performance of download strategies in a P2P like network

被引:0
|
作者
Chiu, Yuh-Ming [1 ]
Eun, Do Young [1 ]
机构
[1] N Carolina State Univ, Dept Elect & Comp Engn, Raleigh, NC 27695 USA
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We investigate the relationship between average download time, system utilization and the level of competition among downloaders in a P2P like network. We show that when the system is nearly 100% utilized, the average download time increases with the level of competition. When the system is under-utilized, using parallel connections can help increase the utilization and hence reduce the average download time. However, contrary to common belief, we show that parallel downloading does not always help; it only helps if the system is under-utilized. We also show that even when the global metrics, such as competition factor and system utilization, are identical from a macroscopic point of view, the microscopic performance for each downloader can be very different depending on different downloading strategies.
引用
收藏
页码:416 / 420
页数:5
相关论文
共 50 条
  • [31] A steganography scheme in P2P network
    Li, Zishuai
    Sun, Xingming
    Wang, Baowei
    Wang, Xiaoliang
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 20 - 24
  • [32] Distributing the keys into P2P network
    Zhou, SJ
    Qin, ZG
    Liu, JD
    GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 460 - 463
  • [33] ComNET: A P2P community network
    Sun, Zhentao
    Xiao, Wenjun
    ADVANCED PARALLEL PROCESSING TECHNOLOGIES, PROCEEDINGS, 2007, 4847 : 271 - 281
  • [34] Revisit the P2P network topology
    Network Research Division, Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080, China
    不详
    Zhongshan Daxue Xuebao, 2006, SUPPL. (72-75):
  • [35] Network Security Technology in P2P
    Zhang, Pengwei
    Jiao, Xiaojing
    Zhou, Ruijin
    ADVANCED RESEARCH ON COMPUTER SCIENCE AND INFORMATION ENGINEERING, 2011, 153 : 145 - 149
  • [36] Deanonymization in the Bitcoin P2P Network
    Fanti, Giulia
    Viswanath, Pramod
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 30 (NIPS 2017), 2017, 30
  • [37] A P2P Network Booting Scheme Using a BitTorrent-like Protocol
    Oliveros, Wigi Vei A.
    Festin, Cedric Angelo M.
    Ocampo, Roel M.
    2013 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2013,
  • [38] A Semantic P2P Overlay Network
    Wang Zhixiao
    Xia Zhanguo
    Xia Shixiong
    ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 720 - 725
  • [39] In-Network P2P Packet Cache Processing using Scalable P2P Network Test Platform
    Yamamoto, Shu
    Nakao, Akihiro
    2011 IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P), 2011, : 162 - +
  • [40] Bounds on the performance of P2P networks using tit-for-tat strategies
    DeFigueiredo, Dimitri
    Venkatachalam, Balaji
    Wu, S. Felix
    P2P: SEVENTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2007, : 11 - 18